[

  {

    “id”: “C01”,

    “title”: “Complete Data Theft + Surveillance”,

    “risk”: “critical”,

    “permissions”: [“READ_SMS”,”READ_CONTACTS”,”ACCESS_FINE_LOCATION”,”RECORD_AUDIO”,”CAMERA”],

    “minMatch”: 4,

    “description”: “Comprehensive surveillance — contact harvest, location, audio/video recording.”

  },

  {

    “id”: “C02”,

    “title”: “Accessibility Exploitation”,

    “risk”: “critical”,

    “permissions”: [“BIND_ACCESSIBILITY_SERVICE”,”READ_SMS”,”SEND_SMS”,”READ_CONTACTS”,”WRITE_CONTACTS”],

    “minMatch”: 4,

    “description”: “Keystroke logging, screen capture, SMS interception, contact manipulation.”

  },

  {

    “id”: “C03”,

    “title”: “Device Lockdown + Ransom”,

    “risk”: “critical”,

    “permissions”: [“DEVICE_POWER”,”DISABLE_KEYGUARD”,”BIND_DEVICE_ADMIN”,”WRITE_SETTINGS”],

    “description”: “Ransomware functionality — locks device, disables unlock screen.”

  },

  {

    “id”: “C04”,

    “title”: “Credential Stealing + Overlay”,

    “risk”: “critical”,

    “permissions”: [“SYSTEM_ALERT_WINDOW”,”READ_PHONE_STATE”,”BIND_ACCESSIBILITY_SERVICE”,”CAMERA”],

    “description”: “Fake login screens + facial/credential capture via camera.”

  },

  {

    “id”: “C05”,

    “title”: “Network Interception / VPN Hijack”,

    “risk”: “critical”,

    “permissions”: [“CHANGE_NETWORK_STATE”,”ACCESS_NETWORK_STATE”,”BIND_VPN_SERVICE”],

    “description”: “Routes all traffic through attacker-controlled server.”

  },

  {

    “id”: “C06”,

    “title”: “Call & Message Interception”,

    “risk”: “critical”,

    “permissions”: [“READ_SMS”,”SEND_SMS”,”READ_CALL_LOG”,”PROCESS_OUTGOING_CALLS”,”READ_PHONE_STATE”],

    “minMatch”: 4,

    “description”: “Full communications monitoring and interception.”

  },

  {

    “id”: “C07”,

    “title”: “Location Tracking + Contact Profiling”,

    “risk”: “high”,

    “permissions”: [“ACCESS_FINE_LOCATION”,”READ_CONTACTS”,”READ_CALL_LOG”],

    “description”: “Comprehensive tracking and social network mapping.”

  },

  {

    “id”: “C08”,

    “title”: “Silent Recording”,

    “risk”: “critical”,

    “permissions”: [“RECORD_AUDIO”,”CAMERA”,”BIND_ACCESSIBILITY_SERVICE”,”WAKE_LOCK”],

    “description”: “Continuous audio/video recording with no user-visible indication.”

  },

  {

    “id”: “C09”,

    “title”: “Banking Trojan Pattern”,

    “risk”: “critical”,

    “permissions”: [“BIND_DEVICE_ADMIN”,”SYSTEM_ALERT_WINDOW”,”READ_SMS”,”SEND_SMS”],

    “description”: “Characteristic of banking trojans like Snowblind and FjordPhantom.”

  },

  {

    “id”: “C10”,

    “title”: “ClayRat / Full Spyware Pattern”,

    “risk”: “critical”,

    “permissions”: [“BIND_ACCESSIBILITY_SERVICE”,”READ_SMS”,”SEND_SMS”,”SYSTEM_ALERT_WINDOW”,”CAMERA”,”RECORD_AUDIO”,”READ_CONTACTS”],

    “minMatch”: 5,

    “description”: “Actual permission pattern from ClayRat spyware (December 2025).”

  },

  {

    “id”: “C11”,

    “title”: “Media Theft”,

    “risk”: “high”,

    “permissions”: [“READ_EXTERNAL_STORAGE”,”ACCESS_MEDIA_LIBRARY”,”WRITE_EXTERNAL_STORAGE”],

    “minMatch”: 2,

    “description”: “Steals photos, videos, documents. ACCESS_MEDIA_LIBRARY may be absent on older APIs.”

  },

  {

    “id”: “C12”,

    “title”: “OTP / Notification Credential Theft”,

    “risk”: “critical”,

    “permissions”: [“BIND_ACCESSIBILITY_SERVICE”,”READ_PHONE_STATE”,”SYSTEM_ALERT_WINDOW”],

    “description”: “Intercepts OTPs, banking alerts, 2FA codes from notifications.”

  },

  {

    “id”: “C13”,

    “title”: “Email & Calendar Surveillance”,

    “risk”: “high”,

    “permissions”: [“READ_CALENDAR”,”READ_EMAIL_ADDRESSES”,”READ_CONTACTS”],

    “description”: “Monitors schedules, meetings, correspondence for targeted attacks.”

  },

  {

    “id”: “C14”,

    “title”: “Package Installation Hijacking”,

    “risk”: “critical”,

    “permissions”: [“INSTALL_PACKAGES”,”DELETE_PACKAGES”,”REQUEST_INSTALL_PACKAGES”,”BIND_DEVICE_ADMIN”],

    “minMatch”: 3,

    “description”: “Silently installs/uninstalls apps; can inject malware into legitimate apps.”

  },

  {

    “id”: “C15”,

    “title”: “Bluetooth Data Theft”,

    “risk”: “high”,

    “permissions”: [“BLUETOOTH_ADMIN”,”ACCESS_FINE_LOCATION”],

    “description”: “Hijacks Bluetooth connections; steals data from paired wearables/devices.”

  },

  {

    “id”: “C16”,

    “title”: “Sensor-Based Spying”,

    “risk”: “high”,

    “permissions”: [“BODY_SENSORS”,”ACCESS_FINE_LOCATION”,”RECORD_AUDIO”],

    “description”: “Uses accelerometer/gyroscope to reconstruct keystrokes, infer activities.”

  },

  {

    “id”: “C17”,

    “title”: “Clipboard Hijacking”,

    “risk”: “critical”,

    “permissions”: [“READ_LOGS”,”BIND_ACCESSIBILITY_SERVICE”,”WRITE_EXTERNAL_STORAGE”],

    “description”: “Reads clipboard (passwords, tokens, sensitive text) and exfiltrates.”

  },

  {

    “id”: “C18”,

    “title”: “Persistent Installation + Hidden Execution”,

    “risk”: “critical”,

    “permissions”: [“RECEIVE_BOOT_COMPLETED”,”BIND_DEVICE_ADMIN”,”CHANGE_COMPONENT_ENABLED_STATE”,”WRITE_SECURE_SETTINGS”],

    “minMatch”: 3,

    “description”: “Survives reboots, hides from app lists, disables security components.”

  },

  {

    “id”: “C19”,

    “title”: “Backup Data Theft”,

    “risk”: “high”,

    “permissions”: [“BACKUP”,”READ_EXTERNAL_STORAGE”,”ACCESS_FINE_LOCATION”],

    “description”: “Accesses device backups containing app data, passwords, and personal info.”

  },

  {

    “id”: “C20”,

    “title”: “WiFi Network Mapping + Surveillance”,

    “risk”: “high”,

    “permissions”: [“ACCESS_WIFI_STATE”,”CHANGE_WIFI_STATE”,”ACCESS_FINE_LOCATION”,”READ_PHONE_STATE”],

    “minMatch”: 3,

    “description”: “WiFi-based location tracking; surveillance via network scanning.”

  },

  {

    “id”: “C21”,

    “title”: “Biometric Bypass”,

    “risk”: “critical”,

    “permissions”: [“USE_BIOMETRIC”,”BIND_ACCESSIBILITY_SERVICE”,”SYSTEM_ALERT_WINDOW”],

    “description”: “Steals biometric data, bypasses fingerprint/face locks, creates fake auth screens.”

  },

  {

    “id”: “C22”,

    “title”: “App Usage Monitoring + Behavioral Profiling”,

    “risk”: “high”,

    “permissions”: [“PACKAGE_USAGE_STATS”,”READ_PHONE_STATE”,”ACCESS_FINE_LOCATION”,”RECORD_AUDIO”],

    “minMatch”: 3,

    “description”: “Tracks which apps you use, when, where — full behavioral profile.”

  },

  {

    “id”: “C23”,

    “title”: “Notification Listener + Message Interception”,

    “risk”: “critical”,

    “permissions”: [“BIND_NOTIFICATION_LISTENER_SERVICE”,”READ_SMS”,”READ_CONTACTS”],

    “description”: “Reads all notifications (banking alerts, 2FA, messages) before you see them.”

  },

  {

    “id”: “C24”,

    “title”: “Account Harvesting”,

    “risk”: “high”,

    “permissions”: [“GET_ACCOUNTS”,”AUTHENTICATE_ACCOUNTS”,”READ_CONTACTS”],

    “description”: “Extracts all linked accounts for credential abuse.”

  },

  {

    “id”: “C25”,

    “title”: “Lockscreen Hijacking + Phishing”,

    “risk”: “critical”,

    “permissions”: [“SET_WALLPAPER”,”SYSTEM_ALERT_WINDOW”,”DISABLE_KEYGUARD”,”BIND_ACCESSIBILITY_SERVICE”],

    “minMatch”: 3,

    “description”: “Replaces lockscreen with phishing UI; prevents legitimate unlock.”

  },

  {

    “id”: “C26”,

    “title”: “Remote Access Enablement”,

    “risk”: “critical”,

    “permissions”: [“WRITE_SECURE_SETTINGS”,”CHANGE_COMPONENT_ENABLED_STATE”,”BIND_DEVICE_ADMIN”],

    “description”: “Enables USB debugging remotely; full device takeover vector.”

  },

  {

    “id”: “C27”,

    “title”: “NFC Payment Interception”,

    “risk”: “high”,

    “permissions”: [“NFC”,”CHANGE_NETWORK_STATE”,”ACCESS_FINE_LOCATION”],

    “description”: “Intercepts NFC payments; steals payment card data; tracks via NFC beacons.”

  },

  {

    “id”: “C28”,

    “title”: “Browser History + Session Theft”,

    “risk”: “high”,

    “permissions”: [“READ_HISTORY_BOOKMARKS”,”READ_EXTERNAL_STORAGE”,”BIND_ACCESSIBILITY_SERVICE”],

    “description”: “Steals browsing history, cookies, saved passwords, session tokens.”

  },

  {

    “id”: “C29”,

    “title”: “Microphone + WiFi Exfiltration”,

    “risk”: “critical”,

    “permissions”: [“RECORD_AUDIO”,”ACCESS_WIFI_STATE”,”CHANGE_WIFI_STATE”],

    “description”: “Records audio while switching to unencrypted WiFi for exfiltration.”

  },

  {

    “id”: “C30”,

    “title”: “Meeting + Social Profiling”,

    “risk”: “critical”,

    “permissions”: [“READ_CALENDAR”,”ACCESS_FINE_LOCATION”,”READ_CONTACTS”],

    “description”: “Full profile: where you go, who you meet, when you meet them.”

  },

  {

    “id”: “C31”,

    “title”: “Call Forwarding + Interception”,

    “risk”: “critical”,

    “permissions”: [“READ_PHONE_STATE”,”CALL_PHONE”,”PROCESS_OUTGOING_CALLS”],

    “description”: “Forwards calls to attacker; monitors all incoming/outgoing calls.”

  },

  {

    “id”: “C32”,

    “title”: “Settings Modification + Malware Persistence”,

    “risk”: “critical”,

    “permissions”: [“WRITE_SETTINGS”,”WRITE_SECURE_SETTINGS”,”BIND_DEVICE_ADMIN”,”RECEIVE_BOOT_COMPLETED”],

    “minMatch”: 3,

    “description”: “Disables security settings, auto-starts on boot, resists uninstallation.”

  },

  {

    “id”: “C33”,

    “title”: “File Access + Log Exfiltration”,

    “risk”: “high”,

    “permissions”: [“READ_EXTERNAL_STORAGE”,”WRITE_EXTERNAL_STORAGE”,”READ_LOGS”],

    “description”: “Reads encrypted files and logs containing keys; stages for exfiltration.”

  },

  {

    “id”: “C34”,

    “title”: “Sensor-Triggered Recording”,

    “risk”: “critical”,

    “permissions”: [“BODY_SENSORS”,”CAMERA”,”RECORD_AUDIO”],

    “description”: “Activates camera/mic only when device is in use — evades detection by timing.”

  },

  {

    “id”: “C35”,

    “title”: “SIM Card + 2FA Interception”,

    “risk”: “critical”,

    “permissions”: [“READ_PHONE_STATE”,”SEND_SMS”,”READ_SMS”,”CHANGE_NETWORK_STATE”],

    “minMatch”: 3,

    “description”: “SIM swap attacks, intercepts SIM-based 2FA, redirects calls/SMS.”

  },

  {

    “id”: “C36”,

    “title”: “Privilege Escalation via Installer”,

    “risk”: “critical”,

    “permissions”: [“REQUEST_INSTALL_PACKAGES”,”WRITE_SECURE_SETTINGS”,”CHANGE_COMPONENT_ENABLED_STATE”],

    “description”: “Silently installs malware, escalates privileges, disables security features.”

  },

  {

    “id”: “C37”,

    “title”: “Notification + Accessibility + SMS Trojan”,

    “risk”: “critical”,

    “permissions”: [“BIND_NOTIFICATION_LISTENER_SERVICE”,”BIND_ACCESSIBILITY_SERVICE”,”SEND_SMS”,”READ_SMS”],

    “minMatch”: 3,

    “description”: “Intercepts all notifications and SMS; sends messages impersonating the user.”

  },

  {

    “id”: “C38”,

    “title”: “Full Call + Ambient Audio Recording”,

    “risk”: “critical”,

    “permissions”: [“RECORD_AUDIO”,”PROCESS_OUTGOING_CALLS”,”READ_CALL_LOG”],

    “description”: “Records all calls and ambient audio for exfiltration.”

  },

  {

    “id”: “C39”,

    “title”: “Anti-Detection via Package Enumeration”,

    “risk”: “high”,

    “permissions”: [“QUERY_ALL_PACKAGES”,”BIND_DEVICE_ADMIN”,”CHANGE_COMPONENT_ENABLED_STATE”],

    “description”: “Identifies installed security apps; disables them; hides malware.”

  },

  {

    “id”: “C40”,

    “title”: “Full UI Takeover”,

    “risk”: “critical”,

    “permissions”: [“SYSTEM_ALERT_WINDOW”,”BIND_ACCESSIBILITY_SERVICE”,”WRITE_SETTINGS”,”DISABLE_KEYGUARD”],

    “minMatch”: 3,

    “description”: “Takes over entire screen; blocks access to system functions.”

  },

  {

    “id”: “C41”,

    “title”: “Sensor Fusion Attack”,

    “risk”: “critical”,

    “permissions”: [“BODY_SENSORS”,”ACCESS_FINE_LOCATION”,”CAMERA”,”RECORD_AUDIO”],

    “minMatch”: 3,

    “description”: “Multi-sensor fusion to infer activities, conversations, and precise location.”

  },

  {

    “id”: “C42”,

    “title”: “Persistent Background Service”,

    “risk”: “critical”,

    “permissions”: [“RECEIVE_BOOT_COMPLETED”,”FOREGROUND_SERVICE”,”CHANGE_COMPONENT_ENABLED_STATE”,”WRITE_SECURE_SETTINGS”],

    “minMatch”: 3,

    “description”: “Survives reboots; runs invisible foreground service; resists uninstallation.”

  },

  {

    “id”: “C43”,

    “title”: “Financial Document Access”,

    “risk”: “high”,

    “permissions”: [“READ_EXTERNAL_STORAGE”,”GET_ACCOUNTS”,”READ_CONTACTS”],

    “description”: “Accesses financial documents, banking app data, account credentials.”

  },

  {

    “id”: “C44”,

    “title”: “Keystroke Inference via Sensors”,

    “risk”: “critical”,

    “permissions”: [“BODY_SENSORS”,”BIND_ACCESSIBILITY_SERVICE”,”CAMERA”],

    “description”: “Uses motion sensors to infer keystrokes; camera for visual confirmation.”

  },

  {

    “id”: “C45”,

    “title”: “Malware Auto-Update”,

    “risk”: “critical”,

    “permissions”: [“WRITE_EXTERNAL_STORAGE”,”INSTALL_PACKAGES”,”RECEIVE_BOOT_COMPLETED”],

    “description”: “Downloads and silently installs malware updates; persists across reboots.”

  },

  {

    “id”: “C46”,

    “title”: “Anti-Analysis / Security Tool Evasion”,

    “risk”: “critical”,

    “permissions”: [“QUERY_ALL_PACKAGES”,”CHANGE_COMPONENT_ENABLED_STATE”,”WRITE_SECURE_SETTINGS”,”BIND_DEVICE_ADMIN”],

    “minMatch”: 3,

    “description”: “Detects and disables security/analysis tools to avoid detection.”

  },

  {

    “id”: “C47”,

    “title”: “2FA Code Interception + Auto-Fill”,

    “risk”: “critical”,

    “permissions”: [“BIND_NOTIFICATION_LISTENER_SERVICE”,”BIND_ACCESSIBILITY_SERVICE”,”SYSTEM_ALERT_WINDOW”],

    “description”: “Intercepts 2FA codes from notifications; auto-fills or exfiltrates them.”

  },

  {

    “id”: “C48”,

    “title”: “Banking App Overlay”,

    “risk”: “critical”,

    “permissions”: [“SYSTEM_ALERT_WINDOW”,”BIND_ACCESSIBILITY_SERVICE”,”PACKAGE_USAGE_STATS”],

    “description”: “Detects banking app launch; overlays fake login screen to steal credentials.”

  },

  {

    “id”: “C49”,

    “title”: “Complete Device Compromise”,

    “risk”: “critical”,

    “permissions”: [“BIND_ACCESSIBILITY_SERVICE”,”BIND_DEVICE_ADMIN”,”WRITE_SECURE_SETTINGS”,”CHANGE_COMPONENT_ENABLED_STATE”,”RECORD_AUDIO”,”CAMERA”,”READ_CONTACTS”,”READ_SMS”,”ACCESS_FINE_LOCATION”],

    “minMatch”: 7,

    “description”: “Full device takeover — the \”nuclear\” spyware profile.”

  }

]